10.25673/118112">


Proceedings of International Conference on Applied Innovation in IT
2024/11/30, Volume 12, Issue 2, pp.35-44

Context-Defined Model of Open Systems Interaction for IoT Cybersecurity Issues Study


Victor Tikhonov, Eduard Siemens, Yevhen Vasiliu, Valery Sitnikov, Abdullah Taher, Olena Tykhonova, Kateryna Shulakova and Serhii Tikhonov


Abstract: The article considers the issues of IoT systems and networks privacy. The complex researches on general system theory state of the art has been surveyed, as well as cybersecurity aspects of IoT technologies and models analyzed over the past decades with respect to the Industry 4.0 concept and industrial IoT architecture. A comprehensive decomposition formalism proposed on the base of M. Mesarowic system theory for presenting the complex cybersecurity object of study as a set of its parts. An original context-defined model of open systems interaction S-CDM has been constructed for cybersecurity issues study with the use of J. Neumann classification and A. Uemov system triad. The S-CDM model is shaped in 3-layer hierarchical graph. The first S-CDM layer displays the cybersecurity problem as a set of relations between the key players of information market - resources, clients and agents. The second S-CDM layer adds the network technologies impact on the relations between the key market-players. The third S-CDM layer includes a “degree of trust” factor into the key market-player relationships. The introduced context-defined model enables to reduce the overall problem complexity of the IoT cybersecurity study to a number of less complex and easy-handled partial tasks. As an example, a particular local version of the S-CDM model is considered in the form of six independent tasks for AI-aided methods of cybersecurity provision. The results of the work intend to contribute general system researches in the sphere of network system modelling and IoT privacy.

Keywords: Internet of Things, Open Systems and Networks, General System Theory, Cybersecurity, Context-Defined Model

DOI: 10.25673/118112

Download: PDF

References:

  1. A. Dennis et al. “System analysis and design”, 5th ed., John Wiley & Sons, 2012, 563 p. [Online]. Available: https://www.google.com/search?client=safari&rls=en&q=Dennis+A.+Wixom+B.H.+System+Analysis+and+Design+5+Ed++pdf&ie=UTF-8&oe=UTF-8.
  2. A.E. Kononuk "Systemology. General System Theory", Book 1. Basics, Kiev, 2014, 568 p. [Online]. Available: https://z-lib.io/book/16404592f.
  3. A. Dennis et al., System Analysis and Design, 5th ed., John Wiley & Sons, 2012, 563 p. [Online]. Available: https://www.google.com/search?client=safari&rls=en&q=Dennis+A.+Wixom+B.H.+System+Analysis+and+Design+5+Ed++pdf&ie=UTF-8&oe=UTF-8.
  4. A. E. Kononuk, Systemology. General System Theory, Book 1. Basics, Kiev, 2014, 568 p. [Online]. Available: https://z-lib.io/book/16404592f.
  5. T. Cody et al., “Motivating a Systems Theory of AI,” ResearchGate Special Feature, vol. 23, no. 1, pp. 37-40, 2020. [Online]. Available: https://www.researchgate.net/publication/340652980_Motivating_a_Systems_Theory_of_AI.
  6. K. Lang et al., “A systems theory-based conceptual framework for holistic digital transformation,” 2021, 24 p. [Online]. Available: https://www.researchgate.net/publication/352020735_A_systems_theory-based_conceptual_framework_for_holistic_digital_transformation.
  7. Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, President’s Council of Advisors on Science and Technology, 2023, 36 p. [Online]. Available: https://www.federalregister.gov/documents/2023/11/01/2023-24283/safe-secure-and-trustworthy-development-and-use-of-artificial-intelligence.
  8. M. Abomhara and M. Koien, “Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks,” Journal of Cyber Security, vol. 4, pp. 65–88, 2015. [Online]. Available: https://www.researchgate.net/publication/349642687_Cyber_Security_and_the_Internet_of_Things_Vulnerabilities_Threats_Intruders_and_Attacks.
  9. M-Bus und M-Bus Wireless Grundlagen. [Online]. Available: https://www.wachendorff-prozesstechnik.de/technologie/feldbus/m-bus/.
  10. H. Ziegler, Serial BUS Systems. [Online]. Available: https://m-bus.com/assets/downloads/MBDOC48.PDF.
  11. S. Payne, “Zigbee Technology: Everything You Need to Know for IoT,” 2023. [Online]. Available: https://www.telit.com/blog/zigbee-iot-guide/.
  12. ZigBee PRO/2007 Layer PICS and Stack Profiles, Rev. 08, 2018. [Online]. Available: https://infocenter.nordicsemi.com/pdf/Zigbee_PRO_Layer_PICS_and_Stack_Profile_8.pdf.
  13. “Y.2060: Overview of the Internet of Things,” 2012. [Online]. Available: https://www.itu.int/rec/T-REC-Y.2060-201206-I.
  14. “IoT Reference Model Introduced at IoT World Forum 2014.” [Online]. Available: https://ytd2525.wordpress.com/2014/10/22/iot-reference-model-introduced-at-iot-world-forum-2014/.
  15. “IoT World Forum Reference Model,” 2014. [Online]. Available: https://www.researchgate.net/figure/IoT-World-Forum-Reference-Model_fig2_323525875.
  16. “What is Industry 4.0?”. [Online]. Available: https://www.ibm.com/topics/industry-4-0/.
  17. J. Voas, Networks of Things, NIST Special Publication 800-183, 2016. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-183.pdf.
  18. “IIoT Explained: Examples, Technologies, Benefits and Challenges.” [Online]. Available: https://www.emqx.com/en/blog/iiot-explained-examples-technologies-benefits-and-challenges.
  19. “Dotdot was a huge hit at CES 2017.” [Online]. Available: https://www.symmetryelectronics.com/blog/dotdot-was-a-huge-hit-at-ces-2017/.
  20. “What is Dotdot?”. [Online]. Available: https://en.dsr-corporation.com/news/what-is-dotdot.
  21. IEEE 802.15.4 Standard for Low-Rate Wireless Networks, 2020. [Online]. Available: https://store.accuristech.com/standards/ieee-802-15-4-2020.
  22. R. Joshi et al., The Industrial Internet of Things Connectivity Framework, 2022. [Online]. Available: https://www.iiconsortium.org/wp-content/uploads/sites/2/2022/06/IIoT-Connectivity-Framework-2022-06-08.pdf.
  23. C. Baudoin et al., “Global Industry Standards for Industrial IoT,” 2022. [Online]. Available: https://www.iiconsortium.org/pdf/IIC_Global_Standards_Strategy_Whitepaper.pdf.
  24. “EMQX Overview.” [Online]. Available: https://docs.emqx.com/en/emqx/latest/.
  25. M. A. Razzaq et al., “Security Issues in the Internet of Things (IoT): A Comprehensive Study,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 6, pp. 383-388, 2017.
  26. “Zigbee Security 101. Architecture And Security Issues,” 2023. [Online]. Available: https://payatu.com/blog/zigbee-security-101-architecture-and-security-issues/.
  27. The Industrial Internet Reference Architecture, 2022. [Online]. Available: https://www.iiconsortium.org/wp-content/uploads/sites/2/2022/11/IIRA-v1.10.pdf.
  28. Industrial Internet of Things. Volume G4: Security Framework, 2016. [Online]. Available: https://www.iiconsortium.org/pdf/IIC_PUB_G4_V1.00_PB.pdf.
  29. R. Kaur, D. Gabrijelčič, and T. Klobučar, “Artificial intelligence for cybersecurity: Literature review and future research directions,” Elsevier, Information Fusion, vol. 97, 2023.


    HOME

       - Call for Papers
       - Paper Submission
       - For authors
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 12, Issue 2 (ICAIIT 2024)        - Volume 12, Issue 1 (ICAIIT 2024)        - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.